aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorrakuco <rakuco@FreeBSD.org>2013-05-19 22:06:36 +0800
committerrakuco <rakuco@FreeBSD.org>2013-05-19 22:06:36 +0800
commitffa8e0b0f6c24a3828dabac99ca5c94ef520bd75 (patch)
tree762a0401a70ea57e1461e1924e78e4af757b564b /security
parentaf1d9e46f9e0c23e000f979a4e4d6b6a567807be (diff)
downloadfreebsd-ports-gnome-ffa8e0b0f6c24a3828dabac99ca5c94ef520bd75.tar.gz
freebsd-ports-gnome-ffa8e0b0f6c24a3828dabac99ca5c94ef520bd75.tar.zst
freebsd-ports-gnome-ffa8e0b0f6c24a3828dabac99ca5c94ef520bd75.zip
Patch multiple vulnerabilities in x11-toolkits/plib.
PR: ports/178710 Submitted by: Denny Lin <dennylin93@hs.ntnu.edu.tw>
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml69
1 files changed, 69 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 655f8a49622c..741968ab9a27 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -51,6 +51,75 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="c72a2494-c08b-11e2-bb21-083e8ed0f47b">
+ <topic>plib -- stack-based buffer overflow</topic>
+ <affects>
+ <package>
+ <name>plib</name>
+ <range><lt>1.8.5_4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>CVE reports:</p>
+ <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-4552">
+ <p>Stack-based buffer overflow in the error function in
+ ssg/ssgParser.cxx in PLIB 1.8.5 allows remote attackers to
+ execute arbitrary code via a crafted 3d model file that
+ triggers a long error message, as demonstrated by a .ase
+ file.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <bid>55839</bid>
+ <cvename>CVE-2012-4552</cvename>
+ <mlist>http://www.openwall.com/lists/oss-security/2012/10/29/8</mlist>
+ </references>
+ <dates>
+ <discovery>2012-10-09</discovery>
+ <entry>2013-05-19</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="13bf0602-c08a-11e2-bb21-083e8ed0f47b">
+ <topic>plib -- buffer overflow</topic>
+ <affects>
+ <package>
+ <name>plib</name>
+ <range><lt>1.8.5_4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Secunia reports:</p>
+ <blockquote cite="https://secunia.com/advisories/47297">
+ <p>A vulnerability has been discovered in PLIB, which can be
+ exploited by malicious people to compromise an application
+ using the library. The vulnerability is caused due to a
+ boundary error within the "ulSetError()" function
+ (src/util/ulError.cxx) when creating the error message,
+ which can be exploited to overflow a static buffer.</p>
+ <p>Successful exploitation allows the execution of arbitrary
+ code but requires that the attacker can e.g. control the
+ content of an overly long error message passed to the
+ "ulSetError()" function.</p>
+ <p>The vulnerability is confirmed in version 1.8.5. Other
+ versions may also be affected.</p>
+ <p>Originally reported in TORCS by Andres Gomez.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2011-4620</cvename>
+ <mlist>http://openwall.com/lists/oss-security/2011/12/21/2</mlist>
+ </references>
+ <dates>
+ <discovery>2011-12-21</discovery>
+ <entry>2013-05-19</entry>
+ </dates>
+ </vuln>
+
<vuln vid="a8818f7f-9182-11e2-9bdf-d48564727302">
<topic>optipng -- use-after-free vulnerability</topic>
<affects>